Locating and Bypassing Holes in Sensor Networks

Size: px
Start display at page:

Download "Locating and Bypassing Holes in Sensor Networks"

Transcription

1 Mobile Networks and Applications 11, , 2006 C 2006 Springer Science + Business Media, LLC. Manufactured in The Netherlands. DOI: /s y Locating and Bypassing Holes in Sensor Networks QING FANG Department of Electrical Engineering, Stanford University, Stanford, CA 94305, USA JIE GAO Center for the Mathematics of Information, California Institute of Technology, Pasadena, CA 91125, USA LEONIDAS J. GUIBAS Department of Computer Science, Stanford University, Stanford, CA 94305, USA Published online: 31 March 2006 Abstract. In real sensor network deployments, spatial distributions of sensors are usually far from being uniform. Such networks often contain regions without enough sensor nodes, which we call holes. In this paper, we show that holes are important topological features that need to be studied. In routing, holes are communication voids that cause greedy forwarding to fail. Holes can also be defined to denote regions of interest, such as the hot spots created by traffic congestion or sensor power shortage. In this paper, we define holes to be the regions enclosed by a polygonal cycle which contains all the nodes where local minima can appear. We also propose simple and distributed algorithms, the TENT rule and BOUNDHOLE, to identify and build routes around holes. We show that the boundaries of holes marked using BOUNDHOLE can be used in many applications such as geographic routing, path migration, information storage mechanisms and identification of regions of interest. Keywords: distributed algorithms, routing, sensor networks 1. Introduction A sensor network is a collection of many small devices, each with sensing, computation and communication capability. It has many potential applications, such as building surveillance, industrial asset management, and environmental monitoring. However, designing scalable, self-organizing and energy-efficient sensor networks faces many challenges. Consequently, sensor networks have attracted researchers from a wide range of disciplines in recent years. A commonly used assumption in studying sensor networks is that sensors are uniformly densely distributed in the plane. However, in a real system deployment, this assumption does not generally hold. Even if sensors are distributed uniformly at random, there are still regions with sensor density much lower than others. Other factors such as terrain variation and sensor power depletion can also contribute to non-uniform sensor distributions. In practice, sensor networks usually have holes, i.e. regions without enough working sensors. Figure 1 shows an example of a large number of dead sensor nodes, creating a big hole in the network. The appearance of such holes changes global network topology, and imposes additional difficulties in organizing the network. Many greedy algorithms that assume dense sensor deployment break down most prominently, due to the local minimum phenomenon in geographical greedy forwarding. Geographical greedy forwarding, a simple, efficient and scalable strategy, is a promising routing scheme for largescale sensor networks when sensor locations are available. In geographical greedy forwarding, a source node knows the location of the destination node, either by acquiring it from a location service [9], or by computing it using a hash function in a data-centric storage scheme [14]. A packet is forwarded to a 1-hop neighbor which is closer to the destination than the current node. This process is repeated until the packet reaches the destination, or the packet is stuck at a node whose 1-hop neighbors are all farther away from the destination. The node where a packet may get stuck is called a local minimum, or a stuck node in this paper. The existence of the local minimum phenomenon is due to the existence of communication voids in the sensor network, so that a packet cannot progress towards its destination by greedily examining only its local neighborhood. There are other examples of greedy algorithms that fail when the assumption of a dense sensor distribution no longer holds. For example, in a dense sensor field, we can use a local and greedy path migration algorithm to adjust a communication path between two moving objects to a homotopy-equivalent path. However, when the routing path is along the boundary of a hole, a local and greedy path migration algorithm faces the same difficulty as that in the greedy forwarding, i.e. there is no local improvement, although bypassing the hole will give a much shorter path. In this paper, we give a mathematical definition of a communication void, i.e. a hole. We define holes to be simple

2 188 FANG, GAO AND GUIBAS Figure 1. Hollow circles represent sensor nodes. The black nodes failed, leaving a large hole in a network with sensors randomly placed. There are also small holes due to low sensor density. Red nodes represent stuck nodes that will be explained later. regions enclosed by a (possibly concave) polygonal cycle which contains all the nodes where local minima can appear. We show that the local minimum phenomenon is simply caused by the existence of holes in the network. Routing in a network with all the holes identified beforehand can be very efficient. When a packet gets stuck at a node following geographic greedy forwarding, this node must be a stuck node on the boundary of a hole. By marking all the boundaries of holes, we actually find routes to get stuck packets out of the local minima a stuck node can simply forward the packet to one of its neighbors that shares the same boundary. Thus, the boundary of a hole cached locally provides a conduit for stuck packets to get out of the local minimum and progress to its destination if a path towards the destination exists. The phenomenon of holes is interesting in many ways. In disaster detection, for example, a forest fire may destroy all the sensors in the fire region and leave a hole in the network. Detection of the boundary for this hole indicates the fire region as shown in figure 1. Massive drop-off of sensors on irregular terrains leaves holes that correspond to mountains or shadows. Hence the holes can indicate the geographic properties of the underlying terrain. Holes can also be used to detect regions with low sensor density due to depletion of node power. Therefore holes are the places where adding new nodes will significantly improve the connectivity of the network. Locating the holes in sensor networks will help us understand network topology and improve its connectivity. Besides communication voids, holes can be defined differently for different applications. Generally, holes are simply regions in which certain measurements by sensors satisfy some local testable conditions. An algorithm that finds holes in networks thus can be used to identify regions of interests to the users. For example, if we let each sensor mark itself as unavailable if its local temperature exceeds a threshold, we can mark the boundaries that enclose all the sensors with local temperatures higher than the threshold. On the other hand, if we let each sensor keep a critical value which can be defined as the number of packets it has to send, or how busy its local wireless medium is, or simply the energy left at that node, all the sensors with their critical values higher/lower than a certain threshold are within regions called hot spots under their corresponding definitions. Therefore, it is possible to have a routing algorithm that bypasses these hot spots and adaptively routes packets, taking into consideration the real-time network traffic conditions and remaining power supplies. In this paper, we focus on defining and discovering holes in a sensor network, as well as building routes around them. We formulate the problem using holes encountered in routing as a special and important case. We first define the stuck nodes where packets can possibly get stuck in greedy multi-hop forwarding. The existence of stuck nodes indicates the existence of holes. For each node in the network, to test if it is a stuck node, we developed the TENT rule which only requires each node to know its 1-hop neighbors locations. To help packets get out of the stuck nodes, we developed a distributed algorithm, BOUNDHOLE, to find the boundary of the hole, i.e. a closed cycle with no self-intersections that bounds a closed region. The holes are defined as the regions of the network with boundaries consisting of all the stuck nodes. Thus, a hole is delimited by its boundary nodes. Both our analysis and simulations show that the holes identified using this method indeed capture the underlying structure of the network and correctly identify regions with communication voids. Depending on application requirements, the boundary of a hole can be found apriorior on demand, i.e. only when a packet gets stuck at a node is the exploration of the boundary of the hole started. Boundary information is then saved at the nodes on the boundary to help follow-on packets. Topological changes of a hole can be discovered and updated locally through careful design of protocols that handle node failures and additions. Another merit of our BOUNDHOLE algorithm is that it only requires angle information within 1-hop neighbors. Such information is completely local. Obtaining accurate angle information is much easier and less costly than obtaining accurate location information. Angle information with rather high accuracy can be derived from beam shaping using directional radiation beams. Although greedy routing uses location information, inaccuracies in node coordinates only result in suboptimal routes being generated. The hole bypassing technique presented in our paper is a better practical solution for bypassing local minima in greedy routing, where accurate node coordinates are unavailable. 2. Related work To help packets get out of the local minimum in a greedy forwarding scheme, Kranakis et al. [6] introduced face routing,

3 LOCATING AND BYPASSING HOLES IN SENSOR NETWORKS 189 Bose et al. [1], and independently Karp and Kung [5], proposed the idea of combining greedy forwarding and perimeter routing on a planar graph that represents the same connectivity as the original communication network. A planar graph is a graph embedded in the Euclidean plane without crossing edges. When a packet gets stuck at a node, it is routed by the right-hand rule counter-clockwise along a face of the planar graph until either it can be routed by greedy forwarding again, or it goes back to where it enters the perimeter mode, which means that no route to the destination is available. This scheme solves the local minimum problem and guarantees the delivery of a packet if a path exists. However, perimeter routing requires the maintenance of the underlying planar graph, which introduces an extra cost. More importantly, based on the simulations that Karp and Kung did by using the greedy perimeter stateless routing (GPSR) protocol [5], most of the packets reach their destinations by greedy forwarding only. Therefore, maintaining a planar graph at every node (even nodes where packets never get stuck), and at all times (even when there are no routing requests) is unnecessary. Unlike the planar graph approach, computing and storing the information of holes are only necessary at the problematic parts of the network where there are indeed communication voids. 3. Algorithms the Tent rule and BoundHole Assume there are n wireless sensor nodes S in the plane, each with a communication range as a disk with radius 1. The communication graph is thus modeled by the Unit Disk Graph (UDG). We try to identify the holes regions without enough sensors, in the sensor network. We do this in two steps. First we want to identify that there exists a hole. This is done by identifying stuck nodes, where packets may possibly get stuck. With the stuck nodes identified, we find the boundary of the holes. We discuss two types of stuck nodes: weakly stuck nodes and strongly stuck nodes, as well as their hole-surrounding routes respectively, in each of the following subsections Weakly stuck nodes and holdes Weakly stuck nodes A node p S is called a weakly stuck node if there exists a node q S outside p s transmission range so that none of the 1-hop neighbors of p is closer to q than p itself. This definition of stuck node suits applications where routing destinations are always some nodes in the network. In such case, a packet can only get stuck at a stuck node. For weakly stuck nodes, we define a hole to be a face with at least 4 vertices in the Delaunay triangulation with all the edges longer than 1 removed Finding the holes For a set of nodes S in the plane, the Voronoi diagram partitions the plane into convex regions, called Voronoi cells, such Figure 2. (i) A Voronoi diagram and corresponding Delaunay triangulation; (ii) A restricted Delaunay graph. that all the points inside one cell are closest to only one node. The Delaunay triangulation is the dual graph of the Voronoi diagram, by connecting the nodes whose corresponding cells are adjacent in the Voronoi diagram. The Delaunay triangulation enjoys an empty-circle property: the circumcircle of a Delaunay triangle contains no nodes of S inside [13]. It s known that geographical forwarding doesn t get stuck in a Delaunay triangulation when the destination is also a node in the point set. In particular, one of the Delaunay neighbors of u must be closer to the destination than u [6]. However, a Delaunay triangulation may contain edges longer than 1 which are not available in a unit disk graph. If all the Delaunay edges attached at a node u are no longer than 1, u is not a weakly stuck node. We define the Restricted Delaunay Graph (RDG) to be the subgraph of the Delaunay triangulation so that only edges no longer than 1 are kept. 1 We identify all the nodes with at least one adjacent Delaunay edge longer than 1 to be the possible stuck nodes. Define a hole to be a face in the RDG with at least 4 vertices. Then from the analysis in the last paragraph we know that, Theorem 3.1. All the weakly stuck nodes must be on the boundaries of holes. Therefore, we can identify the weakly stuck nodes and the corresponding holes by computing the Delaunay triangulation and removing the edges longer than 1. Figure 3 shows an example outcome of the holes identified by the Restricted Delaunay Graph in a 300 m by 300 m area with 1000 sensors placed uniformly at random. The algorithm for computing the Delaunay triangulation and the restricted Delaunay graph is centralized [13]. Leibeherr et al. [11] proposed a distributed implementation, which is still a heavy algorithm for sensor networks. Recently there has been local algorithms to compute variations of the restricted Delaunay graph [4,10,15]. However, they do not produce the restricted Delaunay graph nor does it identify Delaunay edges longer than 1. The distributed algorithm in [4] computes a planar subgraph of the unit disk graph that is a super graph of the restricted Delaunay graph. As an example in figure 4, there are nodes inside the circumcircle of the triangle vup. In particular, pq is a 1 Notice that the restricted Delaunay graph defined in [4] may contain edges that are not in the Delaunay triangulation, as long as the graph is still planar.

4 190 FANG, GAO AND GUIBAS Figure 5. p is a strongly stuck node Strongly stuck nodes and holes Figure 3. A super set of weakly stuck nodes (in red) and the holes identified by the Restricted Delaunay Graph Strongly stuck nodes We say a node p S is a strongly stuck node if there exists a location q outside p s transmission range in R 2 so that none of the 1-hop neighbors of p is closer to q than p itself. By the definitions, all the weakly stuck nodes must be strongly stuck nodes. Figure 4. Algorithms by only local information cannot find out the existence of a long Delaunay edge. Delaunay edge and uv is not a Delaunay edge. But this can not be found out by the algorithm in [4] and any algorithm with only the local information within a constant number of hops of p. Similar scenarios happen with the k-localized Delaunay graph defined in [10] that only uses k-hop local information. Moreover, the set of nodes identified using this method is a super set of the set of real weakly stuck nodes. Furthermore, the definition of weakly stuck nodes is not inclusive enough for applications where the destination may not be a node in the network, as the scenarios discussed in geographic hash table [14]. This motivates us to find better definitions and algorithms The TENT rule We use a simple rule to detect strongly stuck nodes. For each node p, we first order all the 1-hop neighbors of p counterclockwise. We note that the angle is defined counterclockwise. Denote by B r (x) the disk centered at point x with radius r. Now we focus on the case when the destination is inside the cone defined by vpu, where u, v is a pair of angularly adjacent nodes. We draw the perpendicular bisector of up and vp, l 1, l 2. l 1 and l 2 intersect at point o and divide the plane into 4 quadrants. Only the points in the quadrant containing p are closer to p than u and v.ifo is inside the the communication range of p, for any point q inside the cone vpu and outside the transmission range of p, one of u, v is closer to q than p itself. To formalize, the TENT rule checks whether the center of the circumcircle of vpu is inside B 1 (p), the transmission range of p. If the test by the TENT rule is false, we call a stuck angle at a node p to be the angle spanned by a pair of angularly adjacent neighbors of node p, say vpu, such that there is a point q inside the cone centered at p with angle vpu such that the distance between p, q is smaller than the distances from u, v to q. A node is not a strongly stuck node if it has no stuck angle. We note that the TENT rule is a necessary condition that guarantees to find all strongly stuck nodes. All the nodes where a packet may get stuck are marked by the TENT rule. Lemma 3.2. If the angle vpu is no more than 120 degrees, vpu is not a stuck angle, where u, v are angular adjacent neighbors. So one node can have at most 3 stuck angles.

5 LOCATING AND BYPASSING HOLES IN SENSOR NETWORKS 191 Figure 6. (i) uvxy is a unit square. ux is a Delaunay edge with length 2 ε, with a small ε>0, and therefore deleted in the restricted Delaunay triangulation. u, v are identified as possible weakly stuck nodes by the restricted Delaunay method, but they are not strongly stuck nodes; (ii) wvu is a Delaunay triangle. uv and vw are edges of length 1. The angle wvu is larger than 2π/3. v is a strongly stuck node by the TENT rule, but is not identified by the restricted Delaunay method. Proof: First nodes u, v are inside the communication range of p. If the angle vpu is no more than 2π/3, then one of the angles, vpo, opu,mustbeatmostπ/3. Say vpo π/3, then the distance between p and o, po = ov pv 1. Thus the point o is inside the communication range of p. We do this local check for all the pairs of adjacent neighbors of p and identify all the possible stuck angles. The computation can be performed with only information on 1- hop neighbors. Comparison of strongly stuck nodes with the nodes identified by the Restricted Delaunay Graph shows that both of them are supersets of the weakly stuck nodes, but neither is a superset of the other, as shown in figure 6.Fromthis point on, we will refer to strongly stuck nodes BOUNDHOLE The finding hole algorithm Unlike the case of weakly stuck nodes, where a hole can naturally be defined as a face in the Restricted Delaunay Graph, here we need to define what is a hole, how to identify them and how to route around them. Intuitively we want to define a hole as a region bounded by a Jordan curve, 2 i.e., a simple closed curve in the plane. However, for a discrete sensor network, the boundary of a hole has to be a polygonal curve that consists of edges between discrete sensors. Thus it s not possible to avoid degeneracy, for example, the boundary of a hole can only be represented by a polygonal curve where a node or an edge appears multiple times. We define a directed polygonal curve C as a pseudo Jordan curve, if we can duplicate a node into multiple copies with infinitesimal perturbation, one corresponding to each appearance on the polygonal curve C, and the revised curve C is a Jordan curve in the Euclidean plane. Thus a hole is a face bounded by a directed pseudo Jordan curve with no self edge intersections such that all the stuck nodes are on 2 A Jordan curve is a simple and closed curve in the plane which is topologically equivalent to (a homeomorphic image of) the unit circle. Figure 7. Greedy sweeping at t 1. on the boundaries of all holes. Suppose node t 0 is a stuck node with stuck angle pt 0 t 1.TheBOUNDHOLE algorithm starts at t 0 and finds a directed cycle t 0 t 1...t k, t k = p, which is a pseudo Jordan curve and bounds a hole. To be specific, Definition 3.3. A hole is a region bounded by a directed pseudo Jordan curve, which is called the boundary of the hole. All the stuck nodes are on on the boundaries of all holes. Definition 3.4. We call a node u the upstream node of node v, ifuv is a directed edge on the boundary of a hole. In this case, v is called the downstream node of u A greedy algorithm BOUNDHOLE Assume t 0 is a stuck node and the angle pt 0 t 1 is the stuck direction, we use the following algorithm to find the hole that contains t 0 on the boundary. Basically we are trying to find a directed closed cycle that goes back to p. The cycle is found by a local rule at each node. The algorithm works as described below. 1. Suppose the current node is t i, we ll describe an algorithm to find the downstream node t i+1. (At the first step, we take the current node as t 1 whose upstream node is t 0.The upstream node of t 0 is p.) We first define the forbidden region of t i as follows. If the angle t i 2 t i 1 t i is greater than π, then the forbidden region is empty. Otherwise, we take the ray l at t i with direction t i t i 1, which intersects the communication disk of t i at a point t i 1. The forbidden region of t i is the intersection of the unit disk centered at t i with the cone centered at t i 1 with angle t i 1 t i 1 t i 2 (See figure 7). The downstream node of t i can not be inside the forbidden region. We use the right-hand rule starting from t i :wetakearay l at t i with direction t i t i 1 and rotate it angularly around t i counterclockwise. t i+1 is the first node hit by l such that t i+1 is not in the forbidden region of t i.ift i+1 p, then t i+1 will continue this process. 2. During the process we eliminate edge intersections. If an edge t j t j+1 intersects an edge t i t i+1, j>i, there could be two cases. For the edge intersection of the first kind, node t j is not inside the communication range of both node t i and t i+1. For the edge intersection of the second kind,

6 192 FANG, GAO AND GUIBAS Figure 8. Eliminate an edge intersection. The dashed curve shows the sequence of directed edges before and after the elimination of the edge intersection. Figure 10. Strongly stuck nodes (in red) by the TENT rule and the holes identified by BOUNDHOLE. Figure 9. Eliminate an edge intersection. The dashed curve shows the sequence of directed edges before and after the elimination of the edge intersection. In this case, the boundary of the hole produced by BOUNDHOLE is t 0 t i t i+1...t j t i+1 t i t 0. Notice that both t i and t i+1 appear twice on the cycle. But the directed edges t i t i+1 and t i+1 t i appear once each. node t i is not inside the communication range of both node t j and t j+1. We will show in the appendix that these two cases are the only possible cases. For the first kind, we simply delete the run of t i+1 t i+2...t j t j+1 and continue on t 0 t 1...t i t j+1 t j, as shown in figure 8. For the second kind, we take t i+1 as the next hop for t j and continue on t 0 t j t i+1 t i, as shown in figure This procedure is continued until we get a directed closed cycle t 0 t 1 t 2...t k. This cycle has no self edge intersection and encloses a hole. The algorithm BOUNDHOLE is simple and local. Each node stores information about its 1-hop neighbors. The computation at each node uses the 1-hop neighbor information and information carried with the packet that traverses the hole boundary in the bounding hole process. Thus the algorithm is distributed and scales well to large networks. Figure 10 shows the stuck nodes and holes identified using BOUNDHOLE for the same network configuration as shown in figure 3 We compared the two approaches of detecting stuck nodes and holes. The result by BOUNDHOLE captures the topology of the holes more precisely. The result by the Restricted Delaunay method has a lot of false positives. Furthermore, BOUNDHOLE produces tighter holes, i.e. the number of nodes on the boundary of a hole is smaller. The restricted Delaunay graph is a planar graph, thus the holes produced don t have crossing edges. The boundary of a hole produced by BOUNDHOLE is not self-intersecting. But the boundaries of two holes produced by BOUNDHOLE may cross each other. These claims are supported by simulation results. We generated 50 network topologies, using the same setup as figures 3 and 10. Each network has 1000 sensors, distributed uniformly at random in a 300 m by 300 m square field. The average number of stuck nodes detected by the Restricted Delaunay method is Comparably, the average number of stuck nodes detected by the TENT rule is We also observed that a significantly large fraction of the stuck nodes detected by the TENT rule are actually on the outer boundary of the field. For the finding hole methods, small holes detected by one method may not be holes by another. This is consistent with the analytical result. We compared the large holes detected by both methods. On average, the number of nodes on a hole boundary detected by BOUNDHOLE is about 14% smaller than that by the Restricted Delaunay method. Another merit of the BOUNDHOLE algorithm is that it can be implemented by using only angles between adjacent edges. As discovered in [2], by using only local angle information, we can detect all the crossing edges in the communication graph. The greedy sweeping in BOUNDHOLE can also be implemented by using only local angles. The angle information is completely local and can be measured using local interactions such as Angle of Arrival (AoA) or using directional antennas. Comparably, localization algorithm is expensive and inaccurate. The BOUNDHOLE algorithm, being less dependent on location information and more tolerant of measurement inaccuracy, is a better choice for practical implementation.

7 LOCATING AND BYPASSING HOLES IN SENSOR NETWORKS Validity of the algorithm As simple as the BOUNDHOLE algorithm is, the proof that it terminates and indeed generates a finite hole boundary is highly non-trivial. BOUNDHOLE generates a sequence of nodes t 0 t 1...t k. We are going to prove that the sequence is finite, i.e. the algorithm terminates. The proof is based on two properties, which says that we are indeed making progress in generating the sequence. Property 3.1. The forbidden region of t i is always inside the communication range of t i 1.Ift i 2 t i 1 t i are consecutive nodes in the sequence, then t i is not inside the communication range of t i 2 ; or, the angle t i 2 t i 1 t i is greater than or equal to π. Property 3.2. to π/3. The angle t i 2 t i 1 t i is greater than or equal By simple geometry, we can show that Property 3.1 implies Property 3.2. The details appear in the appendix. We then show that the sequence generated by BOUNDHOLE satisfies Property 3.1 and 3.2. Theorem 3.5. The sequence t 0 t 1...t k, generated by BOUNDHOLE satisfies Property 3.1, for all i = 2,...k. Proof: We first show that each subsequence indeed has the Property 3.1 by the following three lemmas. Lemma 3.6. Property 3.1 is true for i = 2. Lemma 3.7. For a piece of sequence t j t j+1 t j+2...t k with no edge-intersections, if for i = j + 2, Property 3.1 is true, then Property 3.1 is true for all j + 2 <i k. Lemma 3.8. If the sequence t 0 t 1...t j satisfies Property 3.1, and there is an edge intersection t i t i+1 and t j t j+1,j >i, the sequence is modified to t 0 t 1...t i 1 t i t j+1 t j (or t 0 t 1...t j 1 t j t i+1 t i ), both t i 1 t i t j+1 and t i t j+1 t j t j 1 t j t i+1 and t j t i+1 t i ) satisfy Property 3.1. With the help of the above lemmas, whose proofs are in the appendix, we can prove the theorem. We chop the sequence t 0 t 1...t k into a set of runs. Each run stops at an edge intersection, i.e. when t j t j+1 intersects with t i t i+1, we stop the current run at t i t j ), and the next run starts from t i t j+1 t j (t j t i+1 t i ), for the edge intersection of the first (second) kind. We check the runs sequentially. For a run of t l t l+1 t l+2...t m, we assume that all the runs before it have been proved to have Property 3.1. From Lemmas 3.6 and 3.8, we know that the first three nodes t l t l+1 t l+2 satisfy Property 3.1. Then Lemma 3.7 says that the run of t l t l+1 t l+2...t m satisfies Property 3.1. Therefore the whole sequence t 0 t 1...t k satisfies Property 3.1 too. Figure 11. t j is inside the forbidden region of t i 1. of the hole boundary, then the angles xpy and x py don t overlap. Proof: Assume a node appears more than once, i.e. the path gets back to a node which it has seen. Assume the current path is t 0 t 1...t j t j+1 t j+2, with t i = t j+1,i<j. If the angle t i 1 t i t i+1 is greater than t i 1 t i t j,t i chooses t i+1 as the next hop, then t j must be inside the forbidden region of t i and therefore inside the communication range of t i 1. In addition, since we eliminate all edge intersections so the two edges t i 2 t i 1 and t j t i don t intersect. So t i 2 is inside the triangle t i t j t i 1, which must be inside the communication range of t i. This contradicts with the fact that t i 2 t i 1 t i satisfies Property 3.1. See figure 11 for an illustration. If the angle t i 1 t i t i+1 is smaller than t i 1 t i t j,asshownin figure 12. In this case, the angle t i 1 t i t i+1 doesn t overlap with the angle t j t i t j+2. Then we can prove the termination of the algorithm. Theorem For any stuck node p, BOUNDHOLE terminates and gives a cycle t 0 t 1 t 2...t k (with t k adjacent to t 0 ) with length at most n, which has no self edge intersections. Proof: We only need to prove that any node u will not appear in the sequence infinitely many times. In fact, each node can only appear in the sequence at most 6 times. By Lemma 3.9, if a node appears multiple times in the sequence generated by BOUNDHOLE, e.g., xpy and x py are two pieces of the Lemma 3.9. If a node p appears multiple times on the boundary of a hole, for example, xpy and x py are two pieces Figure 12. Self-intersections at vertices.

8 194 FANG, GAO AND GUIBAS 3.4. Routing with holes Figure 13. A directed cycle generated by BOUNDHOLE is a consistent boundary surrounding a hole. If p appears three times on the cycle, we virtually spit p into multiple copies, one for each appearance on the cycle. The revised cycle is a Jordan curve. sequence, then the angles xpy and x py don t overlap. Both angles are at least π/3, as shown by Property 3.2. So each node can appear at most 6 times in the sequence. The total length of the sequence is at most 6n. Now we know that a cycle produced by BOUNDHOLE is of finite length. The next theorem says that this directed cycle is indeed a valid boundary of a region, i.e., a pseudo Jordan curve that bounds a hole. Not every directed cycle is a valid boundary of a hole. For example, a directed cycle with the shape of an 8 figure that goes counterclockwise on the top and clockwise on the bottom does not bound a non-empty positive face. Fortunately, the cycles generated by BOUND- HOLE are guaranteed not having this shape. Theorem A directed cycle generated by BOUNDHOLE is a pseudo Jordan curve that bounds a hole. Proof: The cycle generated by BOUNDHOLE is a cycle with no edge intersections. If the cycle doesn t have self intersections at nodes, then it is a Jordan curve that bounds a hole. If a node p appears multiple times on the cycle, by Lemma 3.9, these angles must be disjoint. Thus we can virtually spit p into multiple copies, one for each appearance on the cycle such that the revised cycle has no self intersections (see figure 13). Thus the cycle generated by BOUNDHOLE is a pseudo Jordan curve that bounds a hole. We summarize the properties of a hole identified by BOUNDHOLE as follows. Theorem Suppose a hole is found by BOUNDHOLE with boundary t 0 t 1...t k. Then the followings are true. 1. t 0 t 1...t k is a directed polygonal cycle of length at most 6n such that each angle t i 1 t i t i+1 π/3. 2. The hole is tight in the sense that t i and t i+2 are of distance at least 1 away. 3. If a node p appears multiple times on the boundary of a hole, for example, xpy and x py are two pieces of the hole boundary, then the cones defined by the angles xpy and x py don t intersect. 4. A directed cycle generated by BOUNDHOLE is a pseudo Jordan curve surrounding a hole. Greedy forwarding with holes identified by BOUNDHOLE can be done as follows. If a packet gets stuck with greedy forwarding, the packet is at a stuck node p. Then it must be on the boundary of a hole. We then route the packet along the boundary of the hole. When the packet gets to a node u whose distance to the destination q is closer than that of p, this packet follows greedy forwarding again. In the case that the destination is outside the hole, such a node u must exist. Lemma Suppose a packet is stuck at a node p and the destination is outside the hole where p stays on. Then there must be a node on the boundary of the hole whose distance to the destination is smaller than that of the stuck node p. That is, by routing along the boundary of the hole the packet will reach a node where greedy forwarding can be done. Proof: If a packet is stuck at p,first pq > 1. Also the destination q is inside a cone defined by a stuck angle at p. Thus, if we connect the line pq, it crosses the boundary of the hole at an edge uv. p, q are on different sides of the line defined by uv. We argue that one of u and v are closer to q than p itself. If otherwise, uq > pq > 1, vq > pq > 1. Thus qpu > puq, vpq > qvp. Since uv is an edge, uv 1. Thus the angle uqv < π/3. Therefore vpu = vpq + qpu > 5π/6. Therefore puv < π/6, uvp < π/6. This implies that p is not adjacent to u or v on the boundary of the hole, since the inner angles of any three adjacent nodes on the boundary are at least π/3, by Theorem However, since vpu > 5π/6, pu < 1, pv < 1. Without loss of generality we assume the edge u is the upstream node of v. Thus we have a contradiction since u should have chosen p instead of v as the next hop. To summarize, the packet will leave the hole boundary and continue greedy routing when the destination is outside the hole. If the destination is inside the hole, then it is possible that all the nodes on the hole are not closer to the destination than p is. For example, in figure 14(ii), p is the closest node to q among all the nodes on the boundary of the hole. We note that a hole is a closed region so all the nodes inside the hole, if reachable from p, must be connected to p via some paths crossing the hole boundary. Say such a path connecting p, q Figure 14. (i) The destination q is outside the hole. (ii) Restricted flooding inside the hole.

9 LOCATING AND BYPASSING HOLES IN SENSOR NETWORKS 195 has an edge v u crossing an edge uv on the hole boundary, with u inside the hole and v outside the hole. Then one of u, v must be a 1-hop neighbor of one of u,v. 3 In such a case, the routing along the boundary of the hole may come back to node p without being able to find a node closer to the destination. We then initiate a restricted flooding stage where each node on the boundary of the hole sends the packet to all its 1-hop neighbors, who will flood the nodes within the hole. For the example in figure 14(ii), node v outside the hole will get the packet and then send it to q through u eventually. In summary, by greedy forwarding with holes identified and with possible restricted flooding inside the hole, a packet will always get to the destination if such a path exists in the network. 4. Protocol In the previous section, we described in detail the TENT rule and BOUNDHOLE. In this section, we discuss the protocol to implement them, and optimizations to achieve better network performance. We simulated the TENT rule and BOUNDHOLE at the topology level, using a simulator we developed in C++. For a protocol to be applicable to large-scale networks with limited resources, it should have the following properties: first, it should be distributed in nature for scalability; second, it should be asynchronous; third, it should converge quickly. Our protocol converges in time proportional to the length of the perimeter of the hole Protocol overview At each stuck node, there is only one hole associated with it in each direction it is stuck. However, one node can be on the boundaries of multiple holes. At each stuck node, we associate each stuck angle to the hole in the direction of that stuck angle, building a 1-to-1 mapping from the stuck angles to the holes. This is important for efficient implementation of the algorithms. In the initialization stage, each node broadcasts its coordinates to its 1-hop neighbors. Each node gathers its 1-hop neighbors information, such as their IDs and coordinates. Then each node determines if it is a stuck node and in which direction(s) it is stuck by applying the TENT rule. After the stuck nodes are identified, BOUNDHOLE is used to find the boundaries of the holes. We define a messenger packet of a stuck node v as a packet originated by v to mark the boundary of the hole that belongs to v in the direction of a stuck angle. The process begins as follows: A stuck node initiates a messenger packet in each direction this node is stuck in. Each messenger packet is sent to the neighbor on its left facing the direction of a stuck angle. The ID of the 3 This is because for a pair of crossing edges uv, u v with lengths no more than 1, at least one node is within distance 1 from the other three nodes. originator is recorded in each messenger packet. From this point on, BOUNDHOLE is used at each hop the messenger packet reaches until it returns to its originating node, thus completes the cycle. After the messenger packet returns to its origin, the originating node carries out the following tasks: Generate a random ID for the hole, the hole ID; Claim itself as the leader node by sending a refresh packet P r to announce its own ID, i.e. the leader ID, and the hole ID to all the nodes sharing the same boundary. The route that a refresh packet follows is determined by BOUND- HOLE. Such a refresh packet needs to be sent periodically by the leader node if changes in network topology has to be considered, such as node failures and additions. We use T r to denote this time interval. Up to this point, each node on the boundary of the hole knows its membership identified by the hole ID, the ingress and egress edges through which the messenger packet passes this node Suppressed start There are, initially, no coordinations among the stuck nodes. They initiate their messenger packets in some random order. If we let each of them run BOUNDHOLE to the end, many of the stuck nodes will find the same enclosed region. Figure 15(i) shows such an example. In such a scenario, eight messenger packets will be generated by eight stuck nodes on the boundary of a hole. Each packet will traverse all the nodes in a clockwise order and return to its originating node. This causes unnecessary network traffic and worse yet, packet collisions. Situations can get worse especially for large holes as shown in figure 1. To avoid such overhead, we can suppress redundant hole finding processes. The basic idea is to drop redundant messenger packets as early as possible. The criterion for judging whether a messenger packet is redundant is as follows: at each node, if a messenger packet comes in via an ingress edge that an earlier messenger packet with a lower originator ID has taken, we consider the packet redundant and drop it. Figure 15. Illustrations on cases for suppressed start: (i) the most common case in which suppressed start can effectively reduce traffic overhead; (ii) the case in which suppressed start may be overly suppressing, so that the hole belonging to node k may never get discovered as its messenger packet may get dropped by nodes such as o, p or i.

10 196 FANG, GAO AND GUIBAS Figure 16. Pseudo-code for suppressed start of BOUNDHOLE. The comparison of the originator IDs is necessary to guarantee that at least one messenger packet traverses the whole boundary of the hole. Consequently, the higher the ID of a stuck node, the less likely its messenger packet will travel far along the boundary. This effectively reduces the number of messenger packets in the network. The downside of this simple remedy is that, in certain rare cases, some necessary messenger packets may also be dropped. Figure 15(ii) shows such a case. In this figure, there are loop j l n o p i j and loop k m n o p i j k. These two sets of nodes share some common edges. For the edges they do not share, they will have crossing edges as shown in the figure. It is worth pointing out that edge crossings only occur between edges belonging to different stuck nodes. A loop belonging to one stuck node never intersects itself. If a messenger packet of stuck node k gets dropped along the segments of the cycle shared with some other nodes, i.e. o, p, i, node k may never be able to find the hole belonging to itself. We solve this dilemma as follows. If a stuck node does not have its messenger packet returned within time T m and it is not notified by other stuck nodes that it shares a common boundary with them, it re-sends a messenger packet with its enforce bit set to 1, so that other nodes relaying this packet will not intentionally drop this packet. This mechanism is also useful for fault tolerance purpose in case a messenger packet gets lost due to packet collision. Details of the procedure are shown in figure 16. Please refer to figure15(ii) for the scenario used for the pseudo-code. If the answer is no, v uses the TENT rule to test if it is stuck in the direction spanned by two new angularly adjacent neighbors u and x after the failure of w.ifv is not stuck in that direction, the procedure stops. Figure17(i) shows such a case. If v is stuck in the direction spanned by uvx, BOUNDHOLE is then used in finding the boundary of the hole that belongs to v in this direction. If the answer is yes, as shown in figure 17(ii), v initiates a messenger packet. The sweeping is done with the ingress edge being the edge from the previous neighbor of the failed node in a counterclockwise order, in this case, node u. This edge is also the previous ingress edge for the now defunct egress edge vw. Following BOUNDHOLE, v identifies node x to be the next hop of the boundary. The finding hole process will continue from that point on. In the figure, node t 2, t 3, u and w were the stuck nodes before the failure of w. The boundary of the hole was v w t 1 t 2 t 3 u v.afterw fails, node x, t 1, t 2, t 3, u are the stuck nodes. The boundary now becomes v x y t 1 t 2 t 3 u v. It is possible that a boundary node of a hole is no longer on the boundary because some failed nodes have disconnected this node or newly added nodes have repaired the hole. If a node is no longer on the boundary of a hole, it will no longer receive refresh messages from its upstream node. When this occurs, this node first checks if it is a stuck node. If the answer is no, its status as a boundary node will retire after a retirement timer T d expires. If the answer is yes, there are two possibilities: either the leader node died or part of 4.3. Handling node failures and additions Node failures may create additional holes in the network topology. Failure of a boundary node also changes the boundary of an existing hole. To detect node failures in the local neighborhood, each node periodically broadcasts its heartbeat to its 1-hop neighbors. The time interval of these announcements, T h, is a system design parameter determined by application requirements. If a node v has not heard the heartbeat of its neighbor w for several consecutive T h intervals, it first checks whether it has an egress edge to node w. Figure 17. (i) Node v is not stuck in the direction of uvx after the node w fails. (ii) There was a hole bounded by vwt 1 t 2 t 3 uv. After the failure of node w, the hole is bounded by vxyt 1 t 2 t 3 uv.

11 LOCATING AND BYPASSING HOLES IN SENSOR NETWORKS 197 the boundary failed. This node then initiates a hole finding process using BOUNDHOLE. The choice of T d depends on the application. Generally speaking, the following relation is reasonable: 3T h T r 0.25T d. Such a mechanism makes the discovery and maintenance of holes a self-learning and adaptive process Information storage and memory requirement The solutions we proposed in this paper are practical for sensor networks. For the finding hole process, a node does not need to store any additional information, unless it is on the boundary of a hole. If a node finds itself indeed bordering a hole, depending on the application requirements, we can have a boundary node: (1) only store its upstream and downstream neighbors along the boundary of the hole; or (2) store information about all the nodes sharing the boundary; or in between, (3) store the size and a summary about the shape of the boundary. Storage cost for Option (1) is only O(1). Option 2) and 3) have higher demand on node memory, but capture the geometric shape of the hole and can be used to help improve path quality, as well as support fast and efficient path migration. The planar graph approach can also be augmented to have nodes record such information. But since we only compute and store the holes at problematic parts of the network where there are indeed communication voids, we would expect to save both computation and storage cost compared to the planar graph approach. 5. Applications 5.1. Generating contour lines The BOUNDHOLE algorithm can be used to identify regions of interest, as long as the conditions for including a sensor in a region can be tested locally, such as temperature, gas concentration, electromagnetic signal strength, etc. One example is to find the regions with temperatures higher than a constant. To accomplish this, a sensor needs to know not only its neighbors locations, but also the temperature at each neighbor s location. If the temperature at a neighbor s location is higher than the constant, we consider that neighbor does not exist and run BOUNDHOLE on the reduced neighbor set. When sensor density is high, BOUNDHOLE can be used to find temperature iso-contour lines in the field by repeating the above process using different temperature thresholds. For military applications, contour lines of electromagnetic signal strength emitted from enemy vehicles may help us differentiate how many vehicles are present Avoiding network hot spots The TENT rule and the BOUNDHOLE algorithm can also be used to discover hot spots in the network, and build detour routes for transit packets. To accomplish this, we need a way Figure 18. A multi-hop path between node a and b crosses a multi-hop path between node e and f, creating a hot spot including all the sensor nodes in dark shade. The perimeter enclosing these dark nodes is the boundary marked using the TENT rule and the BOUNDHOLE. Later, for a packet starting at node x to be routed to node y, the connected line segments shown in bold will be the actual route taken in order to avoid further increasing network traffic in the region. to determine if there exists local traffic congestion. One possible way is to use MAC layer information on wireless media availability. Once the local test is established, we can use this test to reduce a node s neighbor set and run BOUND- HOLE to obtain the route for bypassing the congestion area in the network. When a packet encounters a node lying on the boundary of a congested region, the node determines if the destination is inside the region. This can be handled by caching boundary information (detailed or summarized) at each boundary node. If the destination is not inside the region, the packet must be a transit packet. Therefore, the packet should be detoured along the boundary of the congested area. Consequently, while avoiding network hot spots, a route to the destination is also guaranteed if such a route exists. Similarly, hot spots can be defined as regions with sensor nodes with low power levels. Because hot spots are prone to high interference and long network delay, a routing algorithm adaptive to the real-time traffic conditions is able to route packets in healthier parts of the network. Therefore, the network performance under heavy work load degrades more gracefully Supporting path migration Some sensor network applications require maintenance of virtual connections among a set of moving agents. For example, in a pursuer and evader scenario, a sensor network is used to monitor certain moving objects of interest, e.g., the evader. Information about the evader is constantly sent to the location where the pursuer is querying the network through a multi-hop path between the two. As the evader and pursuer move around, the communication path needs constant updates. Network infrastructure supporting fast response to path migration is desirable. In a dense network, path migration can be accomplished by finding the shortest homotopy

12 198 FANG, GAO AND GUIBAS 6. Discussions 6.1. Improvement of path quality Figure 19. A path migration scenario: (i) a multi-hop communication path is established between two mobile agents A and B, using the sensor network; (ii) as both agents move to the right, the path, shown as the thin line, gets stuck at the the boundary of the hole. The improved path is shown as the bold line. equivalent path through greedy adjustment of the previous path. However, when communication voids exist in the network, path migration by greedy adjustment based on only 1-hop neighbor information is impossible. Figure 19 shows a scenario in which a communication path between two agents, A and B, is maintained. There is one hole in the immediate neighborhood of the path between A and B. As both A and B move towards the right, it is desirable to migrate the existing communication path to the right as well. However, because of the existence of the hole, there are no nodes to overlay the path between node A and B and the communication path is stuck at the boundary of the hole, shown as the narrow black line in figure 19(ii). Greedy decisions through local homotopy cannot overcome such irregularity in the network topology. In the scheme we proposed, information about the boundary of the holes can be cached locally at the nodes along the boundary. When the path migrates to the boundary, the two nodes at which the path crosses the boundary decide if the path should further migrate to the other side of the hole, based on the locally cached information about the shape of the hole. Although GPSR guarantees the delivery of a packet to any connected destination within the same network, it may use a long detour compared with the shortest path to the destination [12]. This is because the right-hand-rule used by the perimeter routing always guides the packet by going counterclockwise along a face. But routing clockwise along a face may generate a much shorter path. Greedy forwarding combined with localized search and backtracking [7,8], routes a packet along a path with length O(k 2 ) if the shortest path is O(k). A simple and more practical approach to improve the quality of a path is to store the shape of the hole on the boundary of the hole. When a packet gets stuck, it computes the better side to route around the hole. To do this, we do not need to save the exact shape of the hole; an approximation suffices. This approach could also be incorporated in the GPSR protocol where each node remembers the shape of the face it is on. Since we have a lot fewer holes than the number of faces in the planar graph, we can expect to get better performance in both storage and running time Impact of non-uniform transmission range In the previous sections we assume that the transmission ranges of the wireless nodes are uniform. If the transmission ranges are non-uniform, the efficient routing problem in general becomes extremely hard. Indeed, if the radii of the communication coverage differ, the communication graph is no longer undirected. For example, non-uniform communication range will cause the planar graph in the GPSR protocol to be disconnected, and thus delivery is not guaranteed. For non-uniform communication range, we let two nodes claim each other as 1-hop neighbor only when both can hear from each other. The BOUNDHOLE algorithm will find a cycle back to the original stuck node, although we can no longer guarantee that greedy routing with the help of the holes can always get a packet to its destination if there does exist a path Information storage mechanisms Holes can also be used in information storage mechanisms in sensor networks, such as the geographic hash table (GHT) [14] and DIMENSIONS [3]. A geographic hash table hashes data to points in the plane, which are in most cases not colocated with sensor nodes. A perimeter that encloses the destination is found by the GPSR protocol to replicate data. In this case the planar graph used in GPSR to find the perimeter can be replaced by the holes identified using our algorithm. In fact, almost all the places where a planar graph is needed can be replaced by the holes, whose computation is more efficient and problem-oriented. Figure 20. If t i 2 t i 1 t i have Property 3.1, then t i 2 t i 1 t i π/3.

13 LOCATING AND BYPASSING HOLES IN SENSOR NETWORKS 199 Figure 21. If t i+1 is inside the communication range of t i 1. Appendix A A.1. Proof that Property 3.1 implies Property 3.2 Lemma A.1. If three consecutive nodes t i 2 t i 1 t i in the sequence generated by BOUNDHOLE algorithm have Property 3.1, then they have Property 3.2. Proof: Notice that node t i 1 is within distance 1 from both t i and t i 2. If the angle t i 2 t i 1 t i <π/3, then the node t i must be inside the communication range of node t i 2.This contradicts with Property 3.1. A.2. Proof of Lemma 3.6 Property 3.1 is true for t 2, the original stuck node, since there are no nodes inside the fan defined by the angle t k t 0 t 1 which is greater than 2π/3. So t 2 is either outside the communication range of p or the angle t 0 t 1 t 2 is greater than π. A.3. Proof of Lemma 3.7 We prove by induction. Property 3.1 is true for the case of i = j + 2, by the assumption. Assume Property 3.1 is true for t m, m i. We take a look at the case of t i+1. Assume otherwise, i.e. t i+1 is inside the communication range of t i 1 and the angle t i 1 t i t i+1 is less than π, as shown in figure 21. Then the reason that t i 1 choose i i instead of t i+1 as the next hop must be that t i+1 is inside the forbidden region of t i 1, which implies that t i 3 is inside the convex polygon bounded by t i 2 t i 1 t i t i+1. Since t i+1, t i and t i 1 are all inside the communication range of t i 1,soist i 3. This contradicts with the induction hypothesis. A.4. Proof of Lemma 3.8 Notice that due to BOUNDHOLE, whenever an edge intersection was detected, the current sequence of nodes can not have edge-intersections. Assume that the current edge intersection is edge t j t j+1 and edge t i t i+1, i<j. With the same argument as in Theorem 3.5, Property 3.1 is always true for all the three consecutive nodes before the current edge intersection. Figure 22. (i) t j is not inside the communication range of t i ; (ii) t j is inside the communication range of t i but t j is inside the forbidden region of t i. We first argue that there are only two cases of edge intersections. The reason is that since t j chooses t j+1 as the next hop, it must be (1) t i+1 is angularly closer with t j than t j+1 in counter-clockwise order; or (2), t i+1 is angularly further away from t j than t j+1 in counter-clockwise order. These two cases corresponds to figures 8 and 9 respectively. If t i+1 is angularly closer with t j than t j+1 in counterclockwise order, t i+1 is either inside the forbidden region of t j, or is not inside the communication range of t j. The first case is not possible, since otherwise we should have selfintersections already. In addition, t i chooses t i+1 instead of t j as the next hop, then either t j is not inside the communication range of t i, as shown in figure 22(i); or, t j is inside the communication range of t i but t j is also inside the forbidden region of t i, as shown in figure 22(ii). Figure 22(i) implies that Property 3.1 is true for the three consecutive nodes t i t j+1 t j. In addition, we claim that t i 1 t i t j+1 T h also satisfies Property 3.1. Assume otherwise, then the angle t i 1 t i t j+1 is less than π and t j+1 is inside the communication range of t i 1. Since t i 1 chooses t i instead of t j+1, the reason must be that t j+1 is inside the forbidden region of t i 1. This implies that t i 3 is inside the triangle t i 2 t i 1 t j+1, which is fully inside the communication range of t i 1. Therefore t i 3 is also inside the communication range of t i 1. This leads to contradiction that t i 3 t i 2 t i 1 satisfies the Property 3.1. For figure 22(ii), since t j is inside the forbidden region of t i, then t j must be inside the communication range of t i 1, by Property 3.2 and the assumption. Also t i 2 must be inside the convex polygon bounded by t j,t i+1,t i,t i 1, and therefore inside the communication range of t i. This contradicts with the assumption that t i 2 t i 1 t i satisfies Property 3.1. If t i+1 is angularly further away from t j than t j+1 in counterclockwise order, as shown in figure 9, by the same argument as above we can show that any three consecutive nodes in the sequence t 0 t 1 t j t i+1 t i satisfies Property 3.1. Thus the Lemma 3.8 is proved. Acknowledgments The authors wish to thank Alon Efrat and the anonymous reviewers for their suggestions in improving the presentation of this paper.

14 200 FANG, GAO AND GUIBAS References [1] P. Bose, P. Morin, I. Stojmenovic and J, Urrutia, Routing with guaranteed delivery in ad hoc wireless networks. In Proceedings of the 3rd International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications (DialM 99) (1999) pp [2] S. Bruck, J. Gao and A. Jiang, Localization and routing in sensor networks by local angle information. In Proc. 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing (Mobi- Hoc 05), (May 2005) [3] D. Ganesan and D. Estrin, DIMENSIONS: Why do we need a new data handling architecture for sensor networks? In Proceedings of the ACM Workshop on Hot Topics in Networks (ACM Princeton, NJ, USA, Oct. 2002), pp [4] J. Gao, L.J. Guibas, J. Hershberger, L. Zhang and A. Zhu, Geometric spanner for routing in mobile networks. In Proc. 2nd ACM Symposium in Mobile Ad Hoc Networking and Computing, (2001) pp [5] B. Karp and H. Kung, GPSR: Greedy perimeter stateless routing for wireless networks. In Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MobiCom), (2000) pp [6] E. Karnakis, H. Singh and J. Urrutia, Compass routing on geometric networks. In Proc. 11th Canadian Conference on Computational Gemetry (Vancouver, Aug. 1999) pp [7] F. Kuhn, R. Wattenhofer and A. Zollinger, Asymptotically optimal geometric mobile ad-hoc routing. In Proceedings of the 3rd International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications, (2002) pp [8] F. Kuhn, R. Wattenhofer and A. Zollinger, Worst-case optimal and average-case efficient geometric ad-hoc routing. In Proc. 4th ACM Symposium on Mobile Ad Hoc Networking and Computing, (2003) pp [9] J. Li, J. Jannotti, D.S.J.D. Couto, D. R. Karger and R. Morris, A scalable location service for geographic ad-hoc rorting. In Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MobiCom), (2003) pp [10] X. Li, G. Calinescu, P. Wan and Y. Wang, Localized delaunay triangulation with application in ad hoc wireless networks. IEEE Transaction on Parallel and Distributed System 14(10) (2003) [11] J. Liebeherr, M. Nahas and W. Si, Application-layer multicasting with delaunay triangulation overlays, IEEE Journal on Selected Areas in Communications, 20(8) (2002) [12] M. Mauve, J. Widmer and H. Hartenstein, A survey on position-based routing in mobile ad hoc networks. IEEE Network Magazine, 15(6) (2001) [13] F.P. Preparata and M.I. Shamos, Computational Geometry: An Introduction (Springer-Verlag, New York, NY, 1985). [14] S. Ratnasamy, B. Karp, L. Yin, F. Yu, D. Estrin, R. Govindan and S. Shenker, GHT: A geographic hash table for data-centric storage in sensornets. In Proceedings of the 1st ACM International Workshop on Wireless Sensor Networks and Applications (WSNA) (2002) pp [15] J. Urrutia, Routing with guaranteed delivery in geometric and wirelss networks. In I. Stojmenovic, editor, Handbook of Wireless Networks and Mobile Computing (John Wiley and Sons, 2002) pp Qing Fang is currently a Ph.D. student in Department of Electrical Engineering at Stanford University. Her research interests include algorithm, architecture and protocol design for wireless sensor networks and ad hoc communication. She received her MS in Electrical Engineering from University of Texas at Austin in Fall 1995 and worked in the industry as a system software engineer before joining Stanford in jqfang@stanford.edu. Jie Gao received her Ph.D. degree from department of computer science at Stanford University in 2004 and her B.S. degree from University of Science and Technology of China in She joined State University of New York, Stony Brook as an assistant professor in Fall Her research interests are algorithms design and analysis, ad hoc communication and sensor networks and computational geometry. jgao@ist.caltech.edu. Leonidas J. Guibas heads the Geometric Computation group in the Computer Science Department of Stanford University. He is a member of the Computer Graphics and Artifical Intelligence Laboratories and works on algorithms for sensing, modeling, reasoning, rendering, and acting on the physical world. Professor Guibas interests span computational geometry, geometric modeling, computer graphics, computer vision, sensor networks, robotics, and discrete algorithms all areas in which he has published and lectured extensively. Leonidas Guibas obtained his Ph.D. from Stanford in 1976, under the supervision of Donald Knuth. His main subsequent employers were Xerox PARC, MIT, and DEC/SRC. He has been at Stanford since 1984 as Professor of Computer Science. At Stanford he has developed new courses in algorithms and data structures, geometric modeling, geometric algorithms, and sensor networks. Professor Guibas is an ACM Fellow. guibas@cs.stanford.edu.

Locating and Bypassing Holes in Sensor Networks

Locating and Bypassing Holes in Sensor Networks Locating and Bypassing Holes in Sensor Networks Qing Fang Jie Gao Leonidas J. Guibas April 8, 2005 Abstract In real sensor network deployments, spatial distributions of sensors are usually far from being

More information

Simulations of the quadrilateral-based localization

Simulations of the quadrilateral-based localization Simulations of the quadrilateral-based localization Cluster success rate v.s. node degree. Each plot represents a simulation run. 9/15/05 Jie Gao CSE590-fall05 1 Random deployment Poisson distribution

More information

AN AD HOC network consists of a collection of mobile

AN AD HOC network consists of a collection of mobile 174 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 23, NO. 1, JANUARY 2005 Geometric Spanners for Routing in Mobile Networks Jie Gao, Member, IEEE, Leonidas J. Guibas, John Hershberger, Li Zhang,

More information

Geometric Spanners for Routing in Mobile Networks

Geometric Spanners for Routing in Mobile Networks 1 Geometric Spanners for Routing in Mobile Networks Jie Gao, Leonidas J Guibas, John Hershberger, Li Zhang, An Zhu Abstract We propose a new routing graph, the Restricted Delaunay Graph (RDG), for mobile

More information

An efficient implementation of the greedy forwarding strategy

An efficient implementation of the greedy forwarding strategy An efficient implementation of the greedy forwarding strategy Hannes Stratil Embedded Computing Systems Group E182/2 Technische Universität Wien Treitlstraße 3 A-1040 Vienna Email: hannes@ecs.tuwien.ac.at

More information

Geographical routing 1

Geographical routing 1 Geographical routing 1 Routing in ad hoc networks Obtain route information between pairs of nodes wishing to communicate. Proactive protocols: maintain routing tables at each node that is updated as changes

More information

Challenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning

Challenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning Challenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning Brad Karp Berkeley, CA bkarp@icsi.berkeley.edu DIMACS Pervasive Networking Workshop 2 May, 2 Motivating Examples Vast

More information

Data Communication. Guaranteed Delivery Based on Memorization

Data Communication. Guaranteed Delivery Based on Memorization Data Communication Guaranteed Delivery Based on Memorization Motivation Many greedy routing schemes perform well in dense networks Greedy routing has a small communication overhead Desirable to run Greedy

More information

On Delivery Guarantees of Face and Combined Greedy-Face Routing in Ad Hoc and Sensor Networks

On Delivery Guarantees of Face and Combined Greedy-Face Routing in Ad Hoc and Sensor Networks On Delivery Guarantees of Face and Combined Greedy-Face Routing in Ad Hoc and Sensor Networks ABSTRACT Hannes Frey IMADA, University of Southern Denmark DK-5230 Odense M, Denmark frey@imada.sdu.dk It was

More information

6.854J / J Advanced Algorithms Fall 2008

6.854J / J Advanced Algorithms Fall 2008 MIT OpenCourseWare http://ocw.mit.edu 6.854J / 18.415J Advanced Algorithms Fall 2008 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 18.415/6.854 Advanced

More information

GLIDER: Gradient Landmark-Based Distributed Routing for Sensor Networks. Stanford University. HP Labs

GLIDER: Gradient Landmark-Based Distributed Routing for Sensor Networks. Stanford University. HP Labs GLIDER: Gradient Landmark-Based Distributed Routing for Sensor Networks Qing Fang Jie Gao Leonidas J. Guibas Vin de Silva Li Zhang Stanford University HP Labs Point-to-Point Routing in Sensornets Routing

More information

Computational Geometry

Computational Geometry Lecture 12: Lecture 12: Motivation: Terrains by interpolation To build a model of the terrain surface, we can start with a number of sample points where we know the height. Lecture 12: Motivation: Terrains

More information

Networking Sensors, I

Networking Sensors, I Networking Sensors, I Sensing Networking Leonidas Guibas Stanford University Computation CS428 Networking Sensors Networking is a crucial capability for sensor networks -- networking allows: Placement

More information

On Greedy Geographic Routing Algorithms in Sensing-Covered Networks

On Greedy Geographic Routing Algorithms in Sensing-Covered Networks On Greedy Geographic Routing Algorithms in Sensing-Covered Networks Guoliang Xing; Chenyang Lu; Robert Pless Department of Computer Science and Engineering Washington University in St. Louis St. Louis,

More information

Landmark-based routing

Landmark-based routing Landmark-based routing [Kleinberg04] J. Kleinberg, A. Slivkins, T. Wexler. Triangulation and Embedding using Small Sets of Beacons. Proc. 45th IEEE Symposium on Foundations of Computer Science, 2004. Using

More information

Geo-Routing. Chapter 2. Ad Hoc and Sensor Networks Roger Wattenhofer

Geo-Routing. Chapter 2. Ad Hoc and Sensor Networks Roger Wattenhofer Geo-Routing Chapter 2 Ad Hoc and Sensor Networks Roger Wattenhofer 2/1 Application of the Week: Mesh Networking (Roofnet) Sharing Internet access Cheaper for everybody Several gateways fault-tolerance

More information

CS 532: 3D Computer Vision 14 th Set of Notes

CS 532: 3D Computer Vision 14 th Set of Notes 1 CS 532: 3D Computer Vision 14 th Set of Notes Instructor: Philippos Mordohai Webpage: www.cs.stevens.edu/~mordohai E-mail: Philippos.Mordohai@stevens.edu Office: Lieb 215 Lecture Outline Triangulating

More information

Planar Graphs. 1 Graphs and maps. 1.1 Planarity and duality

Planar Graphs. 1 Graphs and maps. 1.1 Planarity and duality Planar Graphs In the first half of this book, we consider mostly planar graphs and their geometric representations, mostly in the plane. We start with a survey of basic results on planar graphs. This chapter

More information

Midpoint Routing algorithms for Delaunay Triangulations

Midpoint Routing algorithms for Delaunay Triangulations Midpoint Routing algorithms for Delaunay Triangulations Weisheng Si and Albert Y. Zomaya Centre for Distributed and High Performance Computing School of Information Technologies Prologue The practical

More information

Geographic Routing in Simulation: GPSR

Geographic Routing in Simulation: GPSR Geographic Routing in Simulation: GPSR Brad Karp UCL Computer Science CS M038/GZ06 23 rd January 2013 Context: Ad hoc Routing Early 90s: availability of off-the-shelf wireless network cards and laptops

More information

Data-Centric Query in Sensor Networks

Data-Centric Query in Sensor Networks Data-Centric Query in Sensor Networks Jie Gao Computer Science Department Stony Brook University 10/27/05 Jie Gao, CSE590-fall05 1 Papers Chalermek Intanagonwiwat, Ramesh Govindan and Deborah Estrin, Directed

More information

A Survey on Geographic Routing Protocols for Mobile Ad hoc Networks

A Survey on Geographic Routing Protocols for Mobile Ad hoc Networks A Survey on Geographic Routing Protocols for Mobile Ad hoc Networks Atekeh Maghsoudlou, Marc St-Hilaire, and Thomas Kunz Department of Systems and Computer Engineering Carleton University, Ottawa, ON,

More information

Estimating the Free Region of a Sensor Node

Estimating the Free Region of a Sensor Node Estimating the Free Region of a Sensor Node Laxmi Gewali, Navin Rongratana, Jan B. Pedersen School of Computer Science, University of Nevada 4505 Maryland Parkway Las Vegas, NV, 89154, USA Abstract We

More information

Networks: A Deterministic Approach with Constant Overhead

Networks: A Deterministic Approach with Constant Overhead Trace-Routing in 3D Wireless Sensor Networks: A Deterministic Approach with Constant Overhead Su Xia, Hongyi Wu, and Miao Jin! School of Computing and Informatics! University of Louisiana at Lafayette

More information

Boundary Recognition in Sensor Networks by Topological Methods

Boundary Recognition in Sensor Networks by Topological Methods Boundary Recognition in Sensor Networks by Topological Methods Yue Wang, Jie Gao Dept. of Computer Science Stony Brook University Stony Brook, NY Joseph S.B. Mitchell Dept. of Applied Math. and Statistics

More information

Theory and Practice of Geographic Routing

Theory and Practice of Geographic Routing Theory and Practice of Geographic Routing Stefan Rührup Department of Computer Science University of Freiburg, Germany February 2009 Abstract Geographic routing algorithms use position information for

More information

Ad hoc and Sensor Networks Topology control

Ad hoc and Sensor Networks Topology control Ad hoc and Sensor Networks Topology control Goals of this chapter Networks can be too dense too many nodes in close (radio) vicinity This chapter looks at methods to deal with such networks by Reducing/controlling

More information

γ 2 γ 3 γ 1 R 2 (b) a bounded Yin set (a) an unbounded Yin set

γ 2 γ 3 γ 1 R 2 (b) a bounded Yin set (a) an unbounded Yin set γ 1 γ 3 γ γ 3 γ γ 1 R (a) an unbounded Yin set (b) a bounded Yin set Fig..1: Jordan curve representation of a connected Yin set M R. A shaded region represents M and the dashed curves its boundary M that

More information

Routing. Geo-Routing. Thanks to Stefan Schmid for slides

Routing. Geo-Routing. Thanks to Stefan Schmid for slides Routing Geo-Routing Thanks to Stefan Schmid for slides 1 Overview Classic routing overview Geo-routing Greedy geo-routing Euclidean and Planar graphs Face Routing Greedy and Face Routing 2 Shortest path

More information

Efficient Broadcasting in Ad Hoc Wireless Networks Using Directional Antennas

Efficient Broadcasting in Ad Hoc Wireless Networks Using Directional Antennas Efficient Broadcasting in Ad Hoc Wireless Networks Using Directional Antennas Fei Dai Department of Electrical and Computer Engineering North Dakota State University Fargo, ND 5805 Email: fdai@ece.ndsu.edu

More information

Map: Medial axis based geometric routing in sensor networks

Map: Medial axis based geometric routing in sensor networks DOI.7/s11276-6-9857-z Map: Medial axis based geometric routing in sensor networks Jehoshua Bruck Jie Gao Anxiao (Andrew) Jiang Published online: 23 October 6 C Science + Business Media, LLC 6 Abstract

More information

Chapter 7 TOPOLOGY CONTROL

Chapter 7 TOPOLOGY CONTROL Chapter 7 TOPOLOGY CONTROL Distributed Computing Group Mobile Computing Winter 2005 / 2006 Overview Topology Control Gabriel Graph et al. XTC Interference SINR & Scheduling Complexity Distributed Computing

More information

Void Traversal for Guaranteed Delivery in Geometric Routing

Void Traversal for Guaranteed Delivery in Geometric Routing Void Traversal for Guaranteed Delivery in Geometric Routing Mikhail Nesterenko and Adnan Vora Computer Science Department Kent State University Kent, OH, 44242 mikhail@cs.kent.edu, avora@cs.kent.edu arxiv:0803.3632v

More information

[Kleinberg04] J. Kleinberg, A. Slivkins, T. Wexler. Triangulation and Embedding using Small Sets of Beacons. Proc. 45th IEEE Symposium on Foundations

[Kleinberg04] J. Kleinberg, A. Slivkins, T. Wexler. Triangulation and Embedding using Small Sets of Beacons. Proc. 45th IEEE Symposium on Foundations Landmark-based routing Landmark-based routing [Kleinberg04] J. Kleinberg, A. Slivkins, T. Wexler. Triangulation and Embedding using Small Sets of Beacons. Proc. 45th IEEE Symposium on Foundations of Computer

More information

CONNECTED SPACES AND HOW TO USE THEM

CONNECTED SPACES AND HOW TO USE THEM CONNECTED SPACES AND HOW TO USE THEM 1. How to prove X is connected Checking that a space X is NOT connected is typically easy: you just have to find two disjoint, non-empty subsets A and B in X, such

More information

Topology Control in Wireless Networks 4/24/06

Topology Control in Wireless Networks 4/24/06 Topology Control in Wireless Networks 4/4/06 1 Topology control Choose the transmission power of the nodes so as to satisfy some properties Connectivity Minimize power consumption, etc. Last class Percolation:

More information

arxiv: v1 [cs.ni] 28 Apr 2015

arxiv: v1 [cs.ni] 28 Apr 2015 Succint greedy routing without metric on planar triangulations Pierre Leone, Kasun Samarasinghe Computer Science Department, University of Geneva, Battelle A, route de Drize 7, 1227 Carouge, Switzerland

More information

Week 8 Voronoi Diagrams

Week 8 Voronoi Diagrams 1 Week 8 Voronoi Diagrams 2 Voronoi Diagram Very important problem in Comp. Geo. Discussed back in 1850 by Dirichlet Published in a paper by Voronoi in 1908 3 Voronoi Diagram Fire observation towers: an

More information

Efficient Broadcasting in Ad Hoc Wireless Networks Using Directional Antennas

Efficient Broadcasting in Ad Hoc Wireless Networks Using Directional Antennas Efficient Broadcasting in Ad Hoc Wireless Networks Using Directional Antennas Fei Dai and Jie Wu Department of Computer Science and Engineering Florida Atlantic University Boca Raton, FL 3343 Abstract

More information

3D Wireless Sensor Networks: Challenges and Solutions

3D Wireless Sensor Networks: Challenges and Solutions 3D Wireless Sensor Networks: Challenges and Solutions Hongyi Wu Old Dominion University Ph.D., CSE, UB, 2002 This work is partially supported by NSF CNS-1018306 and CNS-1320931. 2D PLANE, 3D VOLUME, AND

More information

Lecture 3: Art Gallery Problems and Polygon Triangulation

Lecture 3: Art Gallery Problems and Polygon Triangulation EECS 396/496: Computational Geometry Fall 2017 Lecture 3: Art Gallery Problems and Polygon Triangulation Lecturer: Huck Bennett In this lecture, we study the problem of guarding an art gallery (specified

More information

Lifetime Comparison on Location Base Routing in Wireless Sensor Networks

Lifetime Comparison on Location Base Routing in Wireless Sensor Networks Lifetime Comparison on Location Base Routing in Wireless Sensor Networks Hadi Asharioun, Hassan Asadollahi, Abdul Samad Ismail, and Sureswaran Ramadass Abstract Lifetime of a sensor network is defined

More information

GLIDER: Gradient Landmark-Based Distributed Routing for Sensor Networks

GLIDER: Gradient Landmark-Based Distributed Routing for Sensor Networks GLIDER: Gradient Landmark-Based Distributed Routing for Sensor Networks Qing Fang Jie Gao Leonidas J. Guibas Vin de Silva Li Zhang Department of Electrical Engineering, Stanford University. jqfang@stanford.edu

More information

ROUTING is an important issue that affects wireless

ROUTING is an important issue that affects wireless 1 Virtual-Coordinate-Based Delivery-Guaranteed Routing Protocol in Wireless Sensor Networks Ming-Jer Tsai, Hong-Yen Yang, Bing-Hong Liu, and Wen-Qian Huang Abstract In this paper, we first propose a method,,

More information

Preferred directions for resolving the non-uniqueness of Delaunay triangulations

Preferred directions for resolving the non-uniqueness of Delaunay triangulations Preferred directions for resolving the non-uniqueness of Delaunay triangulations Christopher Dyken and Michael S. Floater Abstract: This note proposes a simple rule to determine a unique triangulation

More information

Flavor of Computational Geometry. Voronoi Diagrams. Shireen Y. Elhabian Aly A. Farag University of Louisville

Flavor of Computational Geometry. Voronoi Diagrams. Shireen Y. Elhabian Aly A. Farag University of Louisville Flavor of Computational Geometry Voronoi Diagrams Shireen Y. Elhabian Aly A. Farag University of Louisville March 2010 Pepperoni Sparse Pizzas Olive Sparse Pizzas Just Two Pepperonis A person gets the

More information

Triangulation and Convex Hull. 8th November 2018

Triangulation and Convex Hull. 8th November 2018 Triangulation and Convex Hull 8th November 2018 Agenda 1. Triangulation. No book, the slides are the curriculum 2. Finding the convex hull. Textbook, 8.6.2 2 Triangulation and terrain models Here we have

More information

Lecture 16: Voronoi Diagrams and Fortune s Algorithm

Lecture 16: Voronoi Diagrams and Fortune s Algorithm contains q changes as a result of the ith insertion. Let P i denote this probability (where the probability is taken over random insertion orders, irrespective of the choice of q). Since q could fall through

More information

Ad hoc and Sensor Networks Chapter 10: Topology control

Ad hoc and Sensor Networks Chapter 10: Topology control Ad hoc and Sensor Networks Chapter 10: Topology control Holger Karl Computer Networks Group Universität Paderborn Goals of this chapter Networks can be too dense too many nodes in close (radio) vicinity

More information

Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks

Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks Yingshu Li Department of Computer Science Georgia State University Atlanta, GA 30303 yli@cs.gsu.edu Donghyun Kim Feng

More information

The Geometry of Carpentry and Joinery

The Geometry of Carpentry and Joinery The Geometry of Carpentry and Joinery Pat Morin and Jason Morrison School of Computer Science, Carleton University, 115 Colonel By Drive Ottawa, Ontario, CANADA K1S 5B6 Abstract In this paper we propose

More information

Face Routing with Guaranteed Message Delivery in Wireless Ad-hoc Networks. Xiaoyang Guan

Face Routing with Guaranteed Message Delivery in Wireless Ad-hoc Networks. Xiaoyang Guan Face Routing with Guaranteed Message Delivery in Wireless Ad-hoc Networks by Xiaoyang Guan A thesis submitted in conformity with the requirements for the degree of Doctor of Philosophy Graduate Department

More information

CS133 Computational Geometry

CS133 Computational Geometry CS133 Computational Geometry Voronoi Diagram Delaunay Triangulation 5/17/2018 1 Nearest Neighbor Problem Given a set of points P and a query point q, find the closest point p P to q p, r P, dist p, q dist(r,

More information

arxiv: v5 [cs.dm] 9 May 2016

arxiv: v5 [cs.dm] 9 May 2016 Tree spanners of bounded degree graphs Ioannis Papoutsakis Kastelli Pediados, Heraklion, Crete, reece, 700 06 October 21, 2018 arxiv:1503.06822v5 [cs.dm] 9 May 2016 Abstract A tree t-spanner of a graph

More information

Simplicial Complexes: Second Lecture

Simplicial Complexes: Second Lecture Simplicial Complexes: Second Lecture 4 Nov, 2010 1 Overview Today we have two main goals: Prove that every continuous map between triangulable spaces can be approximated by a simplicial map. To do this,

More information

Distributed Algorithm for Voronoi Partition of Wireless Sensor Networks with a Limited Sensing Range

Distributed Algorithm for Voronoi Partition of Wireless Sensor Networks with a Limited Sensing Range sensors Article Distributed Algorithm for Voronoi Partition of Wireless Sensor Networks with a Limited Sensing Range Chenlong He 1, * ID, Zuren Feng 1 and Zhigang Ren 2 1 State Key Laboratory for Manufacturing

More information

Pebble Sets in Convex Polygons

Pebble Sets in Convex Polygons 2 1 Pebble Sets in Convex Polygons Kevin Iga, Randall Maddox June 15, 2005 Abstract Lukács and András posed the problem of showing the existence of a set of n 2 points in the interior of a convex n-gon

More information

Chapter 8. Voronoi Diagrams. 8.1 Post Oce Problem

Chapter 8. Voronoi Diagrams. 8.1 Post Oce Problem Chapter 8 Voronoi Diagrams 8.1 Post Oce Problem Suppose there are n post oces p 1,... p n in a city. Someone who is located at a position q within the city would like to know which post oce is closest

More information

CS S Lecture February 13, 2017

CS S Lecture February 13, 2017 CS 6301.008.18S Lecture February 13, 2017 Main topics are #Voronoi-diagrams, #Fortune. Quick Note about Planar Point Location Last week, I started giving a difficult analysis of the planar point location

More information

WSN Routing Protocols

WSN Routing Protocols WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before

More information

Rubber bands. Chapter Rubber band representation

Rubber bands. Chapter Rubber band representation Chapter 1 Rubber bands In the previous chapter, we already used the idea of looking at the graph geometrically, by placing its nodes on the line and replacing the edges by rubber bands. Since, however,

More information

Topology Control in 3-Dimensional Networks & Algorithms for Multi-Channel Aggregated Co

Topology Control in 3-Dimensional Networks & Algorithms for Multi-Channel Aggregated Co Topology Control in 3-Dimensional Networks & Algorithms for Multi-Channel Aggregated Convergecast Amitabha Ghosh Yi Wang Ozlem D. Incel V.S. Anil Kumar Bhaskar Krishnamachari Dept. of Electrical Engineering,

More information

Localized and Incremental Monitoring of Reverse Nearest Neighbor Queries in Wireless Sensor Networks 1

Localized and Incremental Monitoring of Reverse Nearest Neighbor Queries in Wireless Sensor Networks 1 Localized and Incremental Monitoring of Reverse Nearest Neighbor Queries in Wireless Sensor Networks 1 HAI THANH MAI AND MYOUNG HO KIM Department of Computer Science Korea Advanced Institute of Science

More information

Integrated Coverage and Connectivity Configuration in Wireless Sensor Networks

Integrated Coverage and Connectivity Configuration in Wireless Sensor Networks Integrated Coverage and Connectivity Configuration in Wireless Sensor Networks Xiaorui Wang, Guoliang Xing, Yuanfang Zhang *, Chenyang Lu, Robert Pless, Christopher Gill Department of Computer Science

More information

CMSC 425: Lecture 9 Geometric Data Structures for Games: Geometric Graphs Thursday, Feb 21, 2013

CMSC 425: Lecture 9 Geometric Data Structures for Games: Geometric Graphs Thursday, Feb 21, 2013 CMSC 425: Lecture 9 Geometric Data Structures for Games: Geometric Graphs Thursday, Feb 21, 2013 Reading: Today s materials is presented in part in Computational Geometry: Algorithms and Applications (3rd

More information

Voronoi Diagram. Xiao-Ming Fu

Voronoi Diagram. Xiao-Ming Fu Voronoi Diagram Xiao-Ming Fu Outlines Introduction Post Office Problem Voronoi Diagram Duality: Delaunay triangulation Centroidal Voronoi tessellations (CVT) Definition Applications Algorithms Outlines

More information

Möbius Transformations in Scientific Computing. David Eppstein

Möbius Transformations in Scientific Computing. David Eppstein Möbius Transformations in Scientific Computing David Eppstein Univ. of California, Irvine School of Information and Computer Science (including joint work with Marshall Bern from WADS 01 and SODA 03) Outline

More information

Light-weight Contour Tracking in Wireless Sensor Networks

Light-weight Contour Tracking in Wireless Sensor Networks Light-weight Contour Tracking in Wireless Sensor Networks Xianjin Zhu Rik Sarkar Jie Gao Joseph S. B. Mitchell INFOCOM 08 1 Motivation Sensor network: sense and monitor the physical world (temperature,

More information

Ice-Creams and Wedge Graphs

Ice-Creams and Wedge Graphs Ice-Creams and Wedge Graphs Eyal Ackerman Tsachik Gelander Rom Pinchasi Abstract What is the minimum angle α > such that given any set of α-directional antennas (that is, antennas each of which can communicate

More information

Fractional Cascading in Wireless. Jie Gao Computer Science Department Stony Brook University

Fractional Cascading in Wireless. Jie Gao Computer Science Department Stony Brook University Fractional Cascading in Wireless Sensor Networks Jie Gao Computer Science Department Stony Brook University 1 Sensor Networks Large number of small devices for environment monitoring 2 My recent work Lightweight,

More information

arxiv: v2 [cs.dc] 28 Feb 2018

arxiv: v2 [cs.dc] 28 Feb 2018 Competitive Routing in Hybrid Communication Networks Daniel Jung 1, Christina Kolb 2, Christian Scheideler 3, and Jannik Sundermeier 4 arxiv:1710.09280v2 [cs.dc] 28 Feb 2018 1 Heinz Nixdorf Institute &

More information

Computational Geometry for Imprecise Data

Computational Geometry for Imprecise Data Computational Geometry for Imprecise Data November 30, 2008 PDF Version 1 Introduction Computational geometry deals with algorithms on geometric inputs. Historically, geometric algorithms have focused

More information

6. Concluding Remarks

6. Concluding Remarks [8] K. J. Supowit, The relative neighborhood graph with an application to minimum spanning trees, Tech. Rept., Department of Computer Science, University of Illinois, Urbana-Champaign, August 1980, also

More information

Sensor Deployment Algorithm for Hole Detection and Healing By Using Local Healing

Sensor Deployment Algorithm for Hole Detection and Healing By Using Local Healing Sensor Deployment Algorithm for Hole Detection and Healing By Using Local Healing Rini Baby N M.G University, Kottayam, Kerala, India Abstract: The main services provided by a WSN (wireless sensor network)

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

CAD & Computational Geometry Course plan

CAD & Computational Geometry Course plan Course plan Introduction Segment-Segment intersections Polygon Triangulation Intro to Voronoï Diagrams & Geometric Search Sweeping algorithm for Voronoï Diagrams 1 Voronoi Diagrams Voronoi Diagrams or

More information

Information Brokerage

Information Brokerage Information Brokerage Sensing Networking Leonidas Guibas Stanford University Computation CS321 Information Brokerage Services in Dynamic Environments Information Brokerage Information providers (sources,

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.9, September 2017 139 Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks MINA MAHDAVI

More information

EULER S FORMULA AND THE FIVE COLOR THEOREM

EULER S FORMULA AND THE FIVE COLOR THEOREM EULER S FORMULA AND THE FIVE COLOR THEOREM MIN JAE SONG Abstract. In this paper, we will define the necessary concepts to formulate map coloring problems. Then, we will prove Euler s formula and apply

More information

BGR: Blind Geographic Routing for Sensor Networks

BGR: Blind Geographic Routing for Sensor Networks BGR: Blind Geographic Routing for Sensor Networks Matthias Witt 1 and Volker Turau 1 1 Department of Telematics, Hamburg University of Technology, Hamburg, Germany {matthias.witt,turau}@tuhh.de Abstract

More information

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Mobile Information Systems 9 (23) 295 34 295 DOI.3233/MIS-364 IOS Press Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Keisuke Goto, Yuya Sasaki, Takahiro

More information

Survey on Location Based Routing Protocols in MANET

Survey on Location Based Routing Protocols in MANET Survey on Location Based Routing Protocols in MANET Vivek Nikam, Prof. G.T. Chavan Sinhgad College of engineering, University of Pune Abstract- Due to the infrastructure less and dynamic nature of mobile

More information

Distributed Voronoi diagram computation in wireless sensor networks

Distributed Voronoi diagram computation in wireless sensor networks Distributed Voronoi diagram computation in wireless sensor networks Waleed Alsalih (1) Kamrul Islam (1) Yurai Núñez-Rodríguez (1) Henry Xiao (1) (1) Queen s University(waleed/islam/yurai/xiao@cs.queensu.ca)

More information

Exploration of Path Space using Sensor Network Geometry

Exploration of Path Space using Sensor Network Geometry Exploration of Path Space using Sensor Network Geometry Ruirui Jiang, Xiaomeng Ban Computer Science Stony Brook University {jiang,xban}@cs.sunysb.edu Mayank Goswami Applied Math & Statistics Stony Brook

More information

arxiv: v1 [cs.cc] 30 Jun 2017

arxiv: v1 [cs.cc] 30 Jun 2017 Hamiltonicity is Hard in Thin or Polygonal Grid Graphs, but Easy in Thin Polygonal Grid Graphs Erik D. Demaine Mikhail Rudoy arxiv:1706.10046v1 [cs.cc] 30 Jun 2017 Abstract In 2007, Arkin et al. [3] initiated

More information

Connected Components of Underlying Graphs of Halving Lines

Connected Components of Underlying Graphs of Halving Lines arxiv:1304.5658v1 [math.co] 20 Apr 2013 Connected Components of Underlying Graphs of Halving Lines Tanya Khovanova MIT November 5, 2018 Abstract Dai Yang MIT In this paper we discuss the connected components

More information

The Art Gallery Problem: An Overview and Extension to Chromatic Coloring and Mobile Guards

The Art Gallery Problem: An Overview and Extension to Chromatic Coloring and Mobile Guards The Art Gallery Problem: An Overview and Extension to Chromatic Coloring and Mobile Guards Nicole Chesnokov May 16, 2018 Contents 1 Introduction 2 2 The Art Gallery Problem 3 2.1 Proof..................................

More information

Discharging and reducible configurations

Discharging and reducible configurations Discharging and reducible configurations Zdeněk Dvořák March 24, 2018 Suppose we want to show that graphs from some hereditary class G are k- colorable. Clearly, we can restrict our attention to graphs

More information

IN a mobile ad hoc network, nodes move arbitrarily.

IN a mobile ad hoc network, nodes move arbitrarily. IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 5, NO. 6, JUNE 2006 609 Distributed Cache Updating for the Dynamic Source Routing Protocol Xin Yu Abstract On-demand routing protocols use route caches to make

More information

3. Voronoi Diagrams. 3.1 Definitions & Basic Properties. Examples :

3. Voronoi Diagrams. 3.1 Definitions & Basic Properties. Examples : 3. Voronoi Diagrams Examples : 1. Fire Observation Towers Imagine a vast forest containing a number of fire observation towers. Each ranger is responsible for extinguishing any fire closer to her tower

More information

FREE REGIONS OF SENSOR NODES. Howard R. Hughes College of Engineering. University of Nevada, Las Vegas, NV ABSTRACT

FREE REGIONS OF SENSOR NODES. Howard R. Hughes College of Engineering. University of Nevada, Las Vegas, NV ABSTRACT FREE REGIONS OF SENSOR NODES Laxmi Gewali 1, Navin Rongatana 2, Henry Selvaraj 3, Jan B. Pedersen 4 Howard R. Hughes College of Engineering University of Nevada, Las Vegas, NV 89154-4026 1 laxmi@cs.unlv.edu,

More information

Geographic Routing Without Location Information. AP, Sylvia, Ion, Scott and Christos

Geographic Routing Without Location Information. AP, Sylvia, Ion, Scott and Christos Geographic Routing Without Location Information AP, Sylvia, Ion, Scott and Christos Routing in Wireless Networks Distance vector DSDV On-demand DSR, TORA, AODV Discovers and caches routes on demand Geographic

More information

Routing in Sensor Networks

Routing in Sensor Networks Routing in Sensor Networks Routing in Sensor Networks Large scale sensor networks will be deployed, and require richer inter-node communication In-network storage (DCS, GHT, DIM, DIFS) In-network processing

More information

1 Proximity via Graph Spanners

1 Proximity via Graph Spanners CS273: Algorithms for Structure Handout # 11 and Motion in Biology Stanford University Tuesday, 4 May 2003 Lecture #11: 4 May 2004 Topics: Proximity via Graph Spanners Geometric Models of Molecules, I

More information

COMPUTING CONSTRAINED DELAUNAY

COMPUTING CONSTRAINED DELAUNAY COMPUTING CONSTRAINED DELAUNAY TRIANGULATIONS IN THE PLANE By Samuel Peterson, University of Minnesota Undergraduate The Goal The Problem The Algorithms The Implementation Applications Acknowledgments

More information

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks Stephen S. Yau, Wei Gao, and Dazhi Huang Dept. of Computer Science and Engineering Arizona State University Tempe,

More information

Replacing Failed Sensor Nodes by Mobile Robots

Replacing Failed Sensor Nodes by Mobile Robots Replacing Failed Sensor Nodes by Mobile Robots Yongguo Mei, Changjiu Xian, Saumitra Das, Y. Charlie Hu and Yung-Hsiang Lu Purdue University, West Lafayette {ymei, cjx, smdas, ychu, yunglu}@purdue.edu Abstract

More information

Computational Geometry. Algorithm Design (10) Computational Geometry. Convex Hull. Areas in Computational Geometry

Computational Geometry. Algorithm Design (10) Computational Geometry. Convex Hull. Areas in Computational Geometry Computational Geometry Algorithm Design (10) Computational Geometry Graduate School of Engineering Takashi Chikayama Algorithms formulated as geometry problems Broad application areas Computer Graphics,

More information

Approximating Fault-Tolerant Steiner Subgraphs in Heterogeneous Wireless Networks

Approximating Fault-Tolerant Steiner Subgraphs in Heterogeneous Wireless Networks Approximating Fault-Tolerant Steiner Subgraphs in Heterogeneous Wireless Networks Ambreen Shahnaz and Thomas Erlebach Department of Computer Science University of Leicester University Road, Leicester LE1

More information